94 research outputs found

    An inspection of Microorganism under HACCP System inManufacturing Processof Meat Production

    Get PDF
    Meat product industries have been introduced to HACCP, Hazard Analysis and Critical Control Point, which is internationally recognized as the best method for assuring product safety by controlling potential food safety hazards. The present research was carried out to evaluate the safety of meat production after applying the HACCP system to the manufacturing line of meat products. Factors such as raw meat, the middle product, the final product, the stored product, the equipment and factory workers' conditions were investigated to confirm whether safe meat production is achieved and if an enterprize can maintain such production and marketing. As a result, on one hand, in the case of meat processing, the bacteria in products after cooking were found. Also, no secondary bacteria contamination could be found under good sanitary management of the packaging process. Detection of bacteria in products during storage for 25 days at 4℃ was negligible or even negative. The bacteria in the equipment and working environment and in the bacteria in the packaging process were at lower levels than in the manufacturing process. The levels ov bacteria and mold from the air in the factory suggested to habe no influence on products. The HACCP system effectively managed the sanitation of the manufacturing process in this factory. Furthermore, education of the workforce, and the sanitary management of tools and materials are constantly necessary in order to maintain product safety.⑴ HACCPシステムを導入したロースハムの製造工程および保存中の細菌および理化学的項目を検査した. ⑵ 原料肉は10 3-4 cfu/ ,製造工程では10 5-6 cfu/だった.加熱処理で微生物は死滅し,以後はほとんど無菌状態で非常に衛生的であった.解凍水は10 3 cfu/ だった. ⑶ 原料肉の整形,充塡のため使用した設備・機器・ピックル液には相当数の菌が存在したので、これらの衛生管理が重要である.また,作業場内で存 在する落下菌とカビは製品等に影響のない状態であった. ⑷ 保存中の製品の細菌数は300/ 以下または陰性であった.危害微生物に対する加熱処理は適切に実施されていることが認められた.また,水分,亜硝酸塩,食塩,pH,水分活性の理化学的項目は正常だった. ⑸ HACCPシステムは機能し,加熱食肉製品の微生物規格基準を満足する製品が製造され,保存性も良好であった.また,加熱後の衛生管理ならびに施設・設備・水・作業者の管理は適切であった

    Democracy Incongruence and Protest

    Get PDF
    The literature on protest argues that economic grievances against the government increase the likelihood of a protest. However, the literature offers little explanation for why some states with good economic performance, such as South Korea and China in the 1980s, experienced severe protests. This study suggests that even though a state has a high income level, if its political institutions do not satisfy citizens demands for democracy caused by economic development, citizens would have political grievances against their government. If citizens share such political grievances, their civil society would have the group-level perception of discrepancy between their demand for democracy and their governments institutional supply of political rights, called democracy incongruence. As the level of democracy incongruence in a state increases, the citizens are willing to participate in protest to express political grievances against the government. Empirical results support this argument

    Proximity effect in a ferromagnetic semiconductor with spin-orbit interactions

    Get PDF
    We study theoretically the proximity effect in a ferromagnetic semiconductor with Rashba spin-orbit interaction. The exchange potential generates opposite-spin-triplet Cooper pairs which are transformed into equal-spin-triplet pairs by the spin-orbit interaction. In the limit of strong spin-orbit interaction, symmetry of the dominant Cooper pair depends on the degree of disorder in a ferromagnet. In the clean limit, spin-singlet ss-wave Cooper pairs are the most dominant because the spin-momentum locking stabilizes a Cooper pair consisting of a time-reversal partner. In the dirty limit, on the other hand, equal-spin-triplet ss-wave pairs are dominant because random impurity potentials release the locking. We also discuss the effects of the spin-orbit interaction on the Josephson current.Comment: 9 pages, 12 figure

    Recognition of and interventions for Mibyeong (subhealth) in South Korea: a national web-based survey of Korean medicine practitioners

    Get PDF
    AbstractBackgroundMedically unexplained symptoms (MUSs) are common in primary care. At present, there are no proven, comprehensive treatments available in primary care for patients with MUSs. However, MUS has parallels with “subhealth” or Mibyeong from traditional East-Asian medicine, and thus, Mibyeong interventions could be effective in treating MUS. Unfortunately, studies on Mibyeong and its intervention methods are relatively rare.MethodsWe administered a web-based survey to 17,279 Korean medicine (KM) practitioners registered with the Association of Korean Medicine. The response rate was 4.9% (n=849). Based on the responses received, we assessed how much they agreed with concepts related to Mibyeong on a 7-point scale from “do not agree” to “strongly agree.” Respondents were also asked to indicate how frequently they encountered various subtypes and patterns of Mibyeong, and how frequently they use listed intervention methods.ResultsData from 818 respondents were analyzed after excluding those with no clinical experience. On average, respondents were male general practitioners aged between 30 years and 49 years, working or living in metropolitan areas such as Seoul, Incheon, and Gyeonggi-do. Responses did not differ by demographics. Respondents generally thought that Mibyeong referred to subjective or borderline findings without certain disease, and that Mibyeong has various subtypes and patterns. Subtypes included fatigue, pain, and digestion problems; patterns were either deficiencies (e.g., qi, blood, and yin deficiency) or stagnations (e.g., liver qi depression and qi stagnation). Decoction was the most frequently used type of intervention for Mibyeong of all items listed, followed by acupuncture and moxibustion. Patient education was also recommended, suggesting healthy eating, promoting healthy environment, and exercise.ConclusionWe were able to provide preliminary results on KM practitioners’ recognition of and interventions for Mibyeong, but further research is needed to develop a detailed definition of Mibyeong and its myriad subtypes and patterns, and evaluations of the efficacy of Mibyeong interventions

    Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems

    Get PDF
    Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption systems. The CIKS-128 and CIKS-128H block ciphers are the typical examples of DDP-based encryption algorithms. In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2^44, and 2^48 data/time complexities, respectively

    Strong anomalous proximity effect from spin-singlet superconductors

    Full text link
    The proximity effect from a spin-triplet pxp_x-wave superconductor to a dirty normal-metal has been shown to result in various unusual electromagnetic properties, reflecting a cooperative relation between topologically protected zero-energy quasiparticles and odd-frequency Cooper pairs. However, because of a lack of candidate materials for spin-triplet pxp_x-wave superconductors, observing this effect has been difficult. In this paper, we demonstrate that the anomalous proximity effect, which is essentially equivalent to that of a spin-triplet pxp_x-wave superconductor, can occur in a semiconductor/high-TcT_c cuprate superconductor hybrid device in which two potentials coexist: a spin-singlet dd-wave pair potential and a spin--orbit coupling potential sustaining the persistent spin-helix state. As a result, we propose an alternative and promising route to observe the anomalous proximity effect related to the profound nature of topologically protected quasiparticles and odd-frequency Cooper pairs.Comment: 6 pages, 4 figure

    Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension

    Get PDF
    We propose a new hash domain extension \textit{a prefix-free-Counter-Masking-MD (pfCM-MD)}. And, among security notions for the hash function, we focus on the indifferentiable security notion by which we can check whether the structure of a given hash function has any weakness or not. Next, we consider the security of HMAC, two new prf constructions, NIST SP 800-56A key derivation function, and the randomized hashing in NIST SP 800-106, where all of them are based on the pfCM-MD. Especially, due to the counter of the pfCM-MD, the pfCM-MD are secure against all of generic second-preimage attacks such as Kelsey-Schneier attack \cite{KeSc05} and Elena {\em et al.}\u27 attck \cite{AnBoFoHoKeShZi08}. Our proof technique and most of notations follow those in \cite{BeDaPeAs08,Bellare06,BeCaKr96a}

    Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions

    Get PDF
    We provide simple and unified indifferentiable security analyses of choppfMD, chopMD, a chopMDP (where the permutation PP is to be xored with any non-zero constant.), chopWPH (the chopped version of Wide-Pipe Hash proposed in \cite{Lucks05}), chopEMD, chopNI, chopCS, chopESh hash domain extensions. Even though there are security analysis of them in the case of no-bit chopping (i.e., s=0s=0), there is no unified way to give security proofs. All our proofs in this paper follow the technique introduced in \cite{BeDaPeAs08}. These proofs are simple and easy to follow

    Improved Differential Fault Analysis on ARIA using Small Number of Faults

    Get PDF
    In [15], Li et al. firstly proposed a differential fault analysis on ARIA-128. This attack requires average 45 random byte fault injections. In 2012, Park et al. proposed the improve DFA by using 33 random byte fault injection. Also Kim proposed differential fault analysis based on multi byte fault model. In this model, the number of fault injections is reduce to 13 and If access to the decryption oracle is allowed, only 7 faults are required. In this paper, we propose improved differential fault analysis on ARIA. Based on random byte fault model, the proposed attacks can recover the secret key of ARIA-128/192/256 by using 6 fault injections within a few minutes. Moreover, in cases of ARIA-128 and ARIA-256, it is possible to recover the secret key using only 4 fault injections under a fault assumption where an attacker can induce some faults during both encryption and decryption process, respectively. Our results on ARIA-192/256 are the first known DFA results on them

    A note on ``Improved Fast Correlation Attacks on Stream Ciphers

    Get PDF
    In SAC\u2708, an improved fast correlation attack on stream ciphers was proposed. This attack is based on the fast correlation attack proposed at Crypto\u2700 and combined with the fast Walsh transform. However, we found that the attack results are wrong. In this paper, we correct the results of the attack algorithm by analyzing it theoretically. Also we propose a threshold of the valid bias
    corecore